Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2023 21:08

General

  • Target

    f84a76b5c25c6b5b34c30fd841434445.exe

  • Size

    230KB

  • MD5

    f84a76b5c25c6b5b34c30fd841434445

  • SHA1

    20949be775bf43caa46678dc2364e7e60648a504

  • SHA256

    23d2287f4c1ad9a4973b618d9f5bca47a520ce898ee25bcc6a02c49f64b32e95

  • SHA512

    c167d67d53a3c1e9e1df7a75d14f54374530683747b44c99e5e957b27c663f9357e7fb577e6de923b8ac27eed9ae8770f4aaf87cf5e991e65e177c8af3645efb

  • SSDEEP

    6144:Asr8nDyb54A0IHom40VIkb9Ic3gk38mb1LBS0YMg:j+I50IHV1XIMpMmb1Lo8g

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 12 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of FindShellTrayWindow 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f84a76b5c25c6b5b34c30fd841434445.exe
    "C:\Users\Admin\AppData\Local\Temp\f84a76b5c25c6b5b34c30fd841434445.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of FindShellTrayWindow
    PID:3272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsz7929.tmp\GetVersion.dll

    Filesize

    6KB

    MD5

    dc9562578490df8bc464071f125bfc19

    SHA1

    56301a36ae4e3f92883f89f86b5d04da1e52770d

    SHA256

    0351fe33a6eb13417437c1baaee248442fb1ecc2c65940c9996bcda574677c3f

    SHA512

    9242f8e8ece707874ef61680cbfcba7fc810ec3a03d2cb2e803da59cc9c82badd71be0e76275574bc0c44cdfcef9b6db4e917ca8eb5391c5ae4b37e226b0c321

  • C:\Users\Admin\AppData\Local\Temp\nsz7929.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • memory/3272-22-0x0000000074CA0000-0x0000000074CA9000-memory.dmp

    Filesize

    36KB

  • memory/3272-23-0x0000000074CA0000-0x0000000074CA9000-memory.dmp

    Filesize

    36KB

  • memory/3272-24-0x0000000074CA0000-0x0000000074CA9000-memory.dmp

    Filesize

    36KB

  • memory/3272-58-0x0000000074CA0000-0x0000000074CA9000-memory.dmp

    Filesize

    36KB